|
|
|
@ -485,7 +485,7 @@ and hashes it herself. We no longer need interaction from Bob. She can
|
|
|
|
|
simply publish her public nonce _kG_ and the scalar _s_, and each of the
|
|
|
|
|
thousands of full nodes (past and future) can hash _kG_ to produce _e_,
|
|
|
|
|
use that to produce _exG_, and then verify _sG_ == _kG_ + _exG_. Written
|
|
|
|
|
explicitly, the verification equation becomes _sG_ == _kG_ + _hash_(_kG_) × _xG_.
|
|
|
|
|
explicitly, the verification equation becomes [.keep-together]#_sG_ == _kG_ + _hash_(_kG_) × _xG_.#
|
|
|
|
|
|
|
|
|
|
We need one other thing to finish converting the interactive schnorr
|
|
|
|
|
identity protocol into a digital signature protocol useful for
|
|
|
|
|